Skip to content

Commit f385170

Browse files
committed
azure
1 parent 4a6e170 commit f385170

File tree

6 files changed

+129
-102
lines changed

6 files changed

+129
-102
lines changed

deploy-manage/security/_snippets/find-endpoint.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ If you have many deployments, you can instead go to the **Hosted deployments** (
1010
4. In the deployment overview, under **Applications**, find the application that you want to test.
1111
5. Click **Copy endpoint**. The value looks something like the following:
1212

13-
```
14-
https://my-deployment-d53192.es.us-east-2.aws.elastic-cloud.com
13+
```subs=true
14+
https://my-deployment-d53192.es.{{example-default-dn}}
1515
```
1616

1717
In this endpoint, `my-deployment-d53192` is an alias, and `es` is the product you want to access within your deployment.
Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
11
1. Log in to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
22
2. From any deployment or project on the home page, select **Manage**.
3-
3. Under the **Features** tab, open the **Network security** page.
4-
% From the left navigation menu, select **Access and security** > **Network security**.
3+
3. From the left navigation menu, select **Access and security** > **Network security**.

deploy-manage/security/_snippets/private-url-struct.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
1-
* If you have a [custom endpoint alias](/deploy-manage/deploy/elastic-cloud/custom-endpoint-aliases.md) configured, you can use the custom endpoint URL to connect.
2-
* If you don't have a custom endpoint alias, then use the following URL structure. This URL is built from endpoint information retrieved from your Elastic deployment and the private hosted zone domain name that you registered.
1+
Use the following URL structure. This URL is built from endpoint information retrieved from your Elastic deployment and the private hosted zone domain name that you registered.
32

43
```
54
https://{{alias}}.{{product}}.{{private_hosted_zone_domain_name}}
@@ -12,8 +11,8 @@
1211
```
1312

1413

15-
::::{tip}
14+
:::{tip}
1615
You can use either 443 or 9243 as a port.
1716

1817
You can also connect to the cluster using the {{es}} cluster ID, for example, https://6b111580caaa4a9e84b18ec7c600155e.{{example-phz-dn}}
19-
::::
18+
:::

deploy-manage/security/aws-privatelink-traffic-filters.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ sub:
1212
policy-type: "Private connection"
1313
service-name: "AWS PrivateLink"
1414
example-phz-dn: "vpce.us-east-1.aws.elastic-cloud.com"
15+
example-default-dn: "us-east-1.aws.elastic-cloud.com"
1516
---
1617

1718
# AWS PrivateLink private connections
@@ -176,6 +177,7 @@ The mapping will be different for your region. Our production VPC Service for `u
176177
After you create your VPC endpoint and DNS entries, check that you are able to reach your cluster over PrivateLink.
177178

178179
:::{include} _snippets/private-url-struct.md
180+
:::
179181

180182
To test the connection:
181183

@@ -184,7 +186,7 @@ To test the connection:
184186
:::{include} _snippets/find-endpoint.md
185187
:::
186188

187-
2. Test the setup using the following cURL command. Make sure to replace the URL with your custom endpoint URL, or with your deployment's endpoint information and the private hosted zone domain name that you registered.
189+
2. Test the setup using the following cURL command. Make sure to replace the URL with your deployment's endpoint information and the private hosted zone domain name that you registered.
188190

189191
**Request**
190192
```sh
@@ -215,13 +217,13 @@ Creating a private connection policy and associating it with your deployments al
215217
* Record that you've established private connectivity between AWS and Elastic in the applicable region.
216218
* Filter traffic to your deployment using VCPE filters.
217219
218-
Follow these high-level steps to add a private connection policy that can be associated with your deployment.
220+
Follow these high-level steps to add a private connection policy that can be associated with your deployments.
219221
220222
1. Optional: [Find your VPC endpoint ID](#ec-find-your-endpoint).
221223
2. [Create rules using the VPC endpoint](#ec-create-traffic-filter-private-link-rule-set).
222224
3. [Associate the VPC endpoint with your deployment](#ec-associate-traffic-filter-private-link-rule-set).
223225
224-
#### Optional: Find your VPC endpoint ID [ec-find-your-endpoint]
226+
### Optional: Find your VPC endpoint ID [ec-find-your-endpoint]
225227
226228
The VPC endpoint ID is only required if you want to filter traffic to your deployment using VCPE filters.
227229
@@ -232,7 +234,7 @@ You can find your VPC endpoint ID in the AWS console:
232234
:screenshot:
233235
:::
234236
235-
#### Create a new private connection policy [ec-create-traffic-filter-private-link-rule-set]
237+
### Create a new private connection policy [ec-create-traffic-filter-private-link-rule-set]
236238
237239
Create a new private connection policy.
238240

0 commit comments

Comments
 (0)